Correspondence: A Cyber Disagreement
نویسندگان
چکیده
Policymakers and pundits have been sounding alarms about internet insecurity for years, so the arst appearance of anything in International Security (IS) on this topic is a welcomed development. In the fall 2013 issue, Lucas Kello takes the security studies community to task for ignoring cyber perils, while Erik Gartzke argues that cyberwar is of limited political utility.1 Kello writes that “[t]he Clausewitzian philosophical framework misses the essence of the cyber danger and conceals its true signiacance: the virtual weapon is expanding the range of possible harms between the concepts of war and peace, with important consequences for national and international security” (p. 22). Gartzke counters, “War is fundamentally a political process, as Carl von Clausewitz famously explained. . . . The internet is generally an inferior substitute for terrestrial force in performing the functions of coercion or conquest” (p. 42). If Kello is right, then the long silence in IS on cybersecurity suggests that scholars have neglected a major transformation in security affairs. If Gartzke is right, then scholars can be forgiven their bemusement with inoated cyber rhetoric. In my investigations of American and Chinese activities, I have found cyber interventions to be more complicated and less effective than generally believed.2 Arguments from technology are common in cybersecurity discourse and have excited policymakers, so they should be taken seriously. Yet Kello’s characterization of the skeptical viewpoint as “more visceral than analytical” (p. 9) misrepresents the analytical literature that does exist. Kello insists that “scholarly inattention toward the cyber issue . . . must change” (ibid.), but he disparages the aeld while ignoring relevant scholarship. My commentary addresses the technological determinism of Kello’s argument and his Correspondence: A Cyber Disagreement
منابع مشابه
Leak Location of Pipeline with Multibranch Based on a Cyber-Physical System
Xianming Lang 1 ID , Ping Li 2,* ID , Yan Li 1 and Hong Ren 3 1 School of Automation, Northwestern Polytechnical University, Xi’an 710072, China; [email protected] (X.L.); [email protected] (Y.L.) 2 School of Information and Control Engineering, Liaoning Shihua University, Fushun 113001, China 3 CNPC Northeast Refining & Chemical Engineering Co. Ltd. Shenyang Company, Shenyang 11016...
متن کاملThe Model of Structural Relationships of Cyber Aggression Based on Self-Control with the Mediation of Mobile Phone Addiction in Adolescents: A Descriptive Study
Background and Objectives: Increasingly, cyberbullying has become a common phenomenon eroding the social media environment. The present study was conducted with the aim of determining the structural relationship pattern of cyber aggression based on self-control with the mediation of mobile phone addiction in adolescents. Materials and Methods: In this descriptive study, the statistical populat...
متن کاملCyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملThe Model of Structural Relationships of Cyber-Aggression Based on Family Communication Pattern with the Mediating Role of Addiction to Internet
Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...
متن کاملEvaluation of a complementary cyber education program for a pathophysiology class.
PURPOSE The goal of this study was to develop and evaluate a complementary cyber education program for a required pathophysiology class for nursing students. METHODS The cyber education program comprised electronic bulletin boards, correspondence material storage, an announcement section, a report submission section, reference sites, and statistics on learning rates. Twelve online lectures co...
متن کامل